{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:54:23Z","timestamp":1773269663376,"version":"3.50.1"},"reference-count":5,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2014,4]]},"abstract":"<jats:p>Fragile watermarking has attracted a lot of attention in the last decade. An interesting approach, presented in 2011 by Lin et al., results in very high quality of the watermarked images. However, after a thorough examination of the paper, a few improvements are proposed in our revised version of the algorithm in order to overcome some shortcomings. In particular, changes to the pseudocode and modifications to deal with pixel saturation are suggested, along with a way to improve the scheme security. Finally, a deeper analysis of the security is presented.<\/jats:p>","DOI":"10.1145\/2568224","type":"journal-article","created":{"date-parts":[[2014,4,15]],"date-time":"2014-04-15T17:50:29Z","timestamp":1397584229000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Protecting the Content Integrity of Digital Imagery with Fidelity Preservation"],"prefix":"10.1145","volume":"10","author":[{"given":"Marco","family":"Botta","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Torino, Italy"}]},{"given":"Davide","family":"Cavagnino","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Torino, Italy"}]},{"given":"Victor","family":"Pomponiu","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2014,4,17]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"I. J. Cox M. L. Miller J. A. Bloom J. Fridrich and T. Kalker. 2008. Digital Watermarking and Steganography 2nd edition. Morgan Kaufmann Publishers Inc. San Francisco CA.   I. J. Cox M. L. Miller J. A. Bloom J. Fridrich and T. Kalker. 2008. Digital Watermarking and Steganography 2nd edition. Morgan Kaufmann Publishers Inc. San Francisco CA.","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1--8.","author":"Li L.-J.","unstructured":"L.-J. Li , G. Wang , and L. Fei-Fei . 2007. OPTIMOL: Automatic Object Picture collecTion via Incremental Model Learning . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1--8. L.-J. Li, G. Wang, and L. Fei-Fei. 2007. OPTIMOL: Automatic Object Picture collecTion via Incremental Model Learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1--8."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000486.2000489"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010221"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.060863"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568224","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:29Z","timestamp":1750234229000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568224"}},"subtitle":["An Improved Version"],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":5,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["10.1145\/2568224"],"URL":"https:\/\/doi.org\/10.1145\/2568224","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4]]},"assertion":[{"value":"2012-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}